Welcome to DevCentral


Community Leaderboard

# Name Points
1 Kevin Stewart Kevin Stewart  13509
2 nitass nitass  8759
3 What Lies Beneath What Lies Beneath  5617
4 Jason Rahm Jason Rahm  4363
5 Cory Cory  3441
Full Leaderboard »

Latest Deployment Guides

Upcoming Events

Featured Articles

Recent Articles

Node.js HTTP Message Body: Transfer-Encoding and Content-Length in LineRate lrs/virtualServer Module

Summary: (refer to AskF5 solution article 15884) In the LineRate scripting environment we consult the Content-Length header of HTTP messages entering the system (see the LineRate Developer Scripting Guide under the topic "Writing Past the Content-Length"). Therefore when performing transformations to an HTTP message body, be it a request or response, we must ensure that if a...

Enhancing Your Subscribers' Quality of Experience (QoE)

Guest blog post by Misbah Mahmoodi, Senior Product Marketing Manager, F5 Networks As a mobile operator, you’ve spent or are about to spend a considerable amount of time and money on upgrading your network to 4G LTE and building out cell towers to ensure that your subscribers have LTE coverage. Great! Job done! Now that you have the fastest network, your subscribers are going to have a great...

F5 Friday: The Value of a Full-Stack Partnership

There's a common movie and television trope (known as the Third Wheel) that revolves around a guy, his girlfriend and either his or her "bestie". You know it - it's the bestie hates girlfriend or boyfriend trope, and it's a common comedic line. Only it's not as funny when it's real and in your data center. Yes, your data center. Only the trope involves your Cisco...

F5 Predicts: A right to life, liberty and… broadband

When Indian Prime Minister Narendra Modi took office, his government made its priorities clear: ““If Atal Bihari Vajpayee government was known for national highways, Narendra Modi government will be known for broadband highway,” his Communications Minister said. It might seem surprising that internet connectivity would take top priority among many other issues of national importance, but in the...

NFV - Orchestration – Many Technologies, Approaches, and Confusion – The Need for Convergence

One of the key success criteria for NFV will be the Orchestration/Management component.  While ETSI/NFV-ISG standards group has published clear guidelines/requirements specification on Management and Orchestration (MANO) for NFV, there is no convergence or unification of Orchestration technologies for NFV.  There are many alternative approaches that include both open source and vendor...

Thoughts from the security non-professional: don’t let your data escape

Probably the biggest IT security threat to F5 Networks is typing this blog, and probably the biggest threat to your organization is reading it. OK, I don’t mean me or you, as such. We are, after all, IT professionals and wouldn’t dream of clicking on that suspicions link or using that freebie USB stick we picked up at the trade show. But the truth is people in organizations do dumb things. Even...

Select Between Multiple Network Access Resources with the Edge Client

The recent announcements that web browsers will be removing plugin support means that customers will no longer be able to provide Network Access resources to their end users via the APM web top.  Instead customers will require their end users to install the Edge Client for their Network Access connections. This poses a problem to customers who require that their end users have the ability...

How Diameter routing for policy can become a differentiator when offering VoLTE services?

This blog post was written by Peter Nas, Senior Solution Architect, F5  In a discussion around the added-value of a Diameter Routing Agent (DRA) in a VoLTE deployment, I was asked the following questions and would like to share my response: How does the PCRF (Policy and Charging Rules Function) make decisions around policies? Are all policies defined per subscriber, or are some...

F5 Threat Analysis: It's a mad, mad, mad, mad ... bot

Madness. It's an aptly named bot, as it's likely to evoke just that reaction in those who find it lurking in their systems or at whom its sets it sights. A disturbing trend illustrated by the focus of our latest threat analysis is the increase in attention being paid to application layer attacks. Not just directly, but also as part of larger volumetric attacks. Increasingly...

아시아태평양지역 클라우드의 현주소 – Part 2

Please find the English language post from which this was adapted here. 이 글은 아시아태평양지역에서의 클라우드에 대하여 살펴보는 시리즈의 두 번째 글이다. 이 글에서는 지역 내 클라우드의 현주소, 클라우드가 어떻게 사용되고 있는지, 무엇이 클라우드가 더 확산되는 것을 막고 있는지, 그리고 클라우드가 어떻게 혁신을 위해 사용될 수 있는지에 대해 알아볼 것이며, 또한 FSI (금융 및 증권업계) 에서의 클라우드에 대해서도 점검해 보겠다. 시리즈의 첫 번째 글에서는 아시아태평양지역 내 클라우드의 현주소와 확산 정도, 무엇이 클라우드가 더 확산되는 것을 막고 있는지에 대하여 살펴 보았다. 하지만 이미 클라우드를 채택한 기업들은 실제로...

Recent Videos